More than 600,000 small office/home office (SOHO) routers are estimated to have been bricked and...
Microsoft has emphasized the need for securing internet-exposed operational technology (OT) devices following a spate...
Digital content is a double-edged sword, providing vast benefits while simultaneously posing significant threats to...
The Russian GRU-backed threat actor APT28 has been attributed as behind a series of campaigns...
OpenAI on Thursday disclosed that it took steps to cut off five covert influence operations...
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Thursday added a security flaw impacting...
Cloudflare on Thursday said it took steps to disrupt a month-long phishing campaign orchestrated by...
A previously undocumented cyber espionage-focused threat actor named LilacSquid has been linked to targeted attacks...
The threat actors behind the RedTail cryptocurrency mining malware have added a recently disclosed security...
Cybersecurity researchers have warned that multiple high-severity security vulnerabilities in WordPress plugins are being actively...
Software algorithms that estimate a person’s age from a photo offer a potential way to...
Security leaders are in a tricky position trying to discern how much new AI-driven cybersecurity...
Europol on Thursday said it shut down the infrastructure associated with several malware loader operations...
The U.S. Department of Justice (DoJ) on Wednesday said it dismantled what it described as...
Okta is warning that a cross-origin authentication feature in Customer Identity Cloud (CIC) is susceptible...
Cybersecurity researchers have warned of a new malicious Python package that has been discovered in...
Check Point is warning of a zero-day vulnerability in its Network Security gateway products that...
Brazilian banking institutions are the target of a new campaign that distributes a custom variant...
The U.S. Department of Justice (DoJ) has sentenced a 31-year-old to 10 years in prison...
A recent study by Wing Security found that 63% of businesses may have former employees...
A never-before-seen North Korean threat actor codenamed Moonstone Sleet has been attributed as behind cyber...
The online criminal bazaar BreachForums has been resurrected merely two weeks after a U.S.-led coordinated...
How the NCSC is helping public sector organisations to adopt important anti-phishing protocols....
An Indian national has pleaded guilty in the U.S. over charges of stealing more than...
You’re probably familiar with the term “critical assets”. These are the technology assets within your...
The threat actors behind the CatDDoS malware botnet have exploited over 80 known security flaws...
Unknown threat actors are abusing lesser-known code snippet plugins for WordPress to insert malicious PHP...
A maximum-severity security flaw has been disclosed in the TP-Link Archer C5400X gaming router that could lead...
Microsoft is calling attention to a Morocco-based cybercrime group dubbed Storm-0539 that’s behind gift card fraud and...
The transition to the cloud, poor password hygiene and the evolution in webpage technologies have all enabled...
Interested in getting in contact with us about our services? Perhaps you would like to know more about how we can help you specifically? Tell us more, and we will happily listen to and provide you with further information and a consultation.